- Description
- Group-Office is an enterprise CRM and groupware tool. In affected versions there is full Server-Side Request Forgery (SSRF) vulnerability in the /api/upload.php endpoint. The /api/upload.php endpoint does not filter URLs which allows a malicious user to cause the server to make resource requests to untrusted domains. Note that protocols like file:// can also be used to access the server disk. The request result (on success) can then be retrieved using /api/download.php. This issue has been addressed in versions 6.8.15, 6.7.54, and 6.6.177. Users are advised to upgrade. There are no known workarounds for this vulnerability.
- Source
- security-advisories@github.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-918
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "358DA8A0-B9ED-4A34-9137-FF09D7AFD94D",
"versionEndExcluding": "6.6.177",
"versionStartIncluding": "6.3.1"
},
{
"criteria": "cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5C2230FE-1533-4B8A-9C5B-771DFBD0C492",
"versionEndExcluding": "6.7.54",
"versionStartIncluding": "6.7.0"
},
{
"criteria": "cpe:2.3:a:group-office:group_office:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "84304CD1-C71F-481B-9C4A-16157206A677",
"versionEndExcluding": "6.8.15",
"versionStartIncluding": "6.8.0"
}
],
"operator": "OR"
}
]
}
]